Answer:
:)
Explanation:
Copyright Designs and Patents Act
The Copyright Designs and Patents Act (1988) gives creators of digital media the rights to control how their work is used and distributed. ...
Anything which you design or code is automatically copyrighted and may not be copied without your permission, as the digital creator.
Answer:
i have no ideaaaaaaaaaaaaaaaaaaaaaa
Explanation:
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa kill me
Answer:
computer-assisted self-interviewing
Explanation:
Based on the description of the interviewing method that is being provided, it can be said that this method is known as computer-assisted self-interviewing. Like mentioned in the question this is when interviewees answer the interview questions through a computer screen. This is similar to telephone interviews but it is instead through a computer.
Answer:
System software.
Explanation:
System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.
An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
Answer:
Quarantine the computer.
Explanation:
Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.
In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.
Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.